Computer security

Results: 47159



#Item
931Software / Computing / System software / Computer network security / Iptables / Packet processing / Firewall / Netfilter / Communications protocol / Transmission Control Protocol / Ipfirewall / Statistical classification

Trees in the List: Accelerating List-based Packet Classification Through Controlled Rule Set Expansion Sven Hager Stefan Selent

Add to Reading List

Source URL: conferences2.sigcomm.org

Language: English - Date: 2014-12-01 16:55:48
932Technology / Security / Digital media / Digital divide / Cultural globalization / Internet / New media / Telegraphy / Virtual reality / Computer security / Digital native

DIGITAL DATA SECURITY COMMUNICATION

Add to Reading List

Source URL: www.divsi.de

Language: English - Date: 2013-08-26 10:24:25
933Security / Computer law / Signature / Computing / Cryptography / E-commerce / EIDAS / General Data Protection Regulation / Electronic signature / Computer security / Cloud computing / Cloud Security Alliance

e-Signatures & e-Seals – Opportunities and Challenges demystifying and preparing for the age of eIDAS Brussels Febkindly hosted by EEMA – Limited Distribution Only

Add to Reading List

Source URL: www.eema.org

Language: English - Date: 2016-05-13 04:17:09
934Password / Security / Point and click

The Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Camera-Ready Submission guidelines to ASSYST Submission Instructions to ASSYST – ICST Paper Submission and Review System 1. Reg

Add to Reading List

Source URL: electronic-health.org

Language: English - Date: 2010-09-27 05:44:17
935Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Password synchronization / Password policy

Fischer Identity™ Turn Identity Management into a Strategic Advantage Password Reset & Synchronization

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2016-06-03 10:12:26
936Information privacy / Payment cards / Computing / Business / Economy / Computer law / E-commerce / Payment Card Industry Data Security Standard / Peripheral Component Interconnect / Qualys / Conventional PCI / Payment card industry

PCI Compliance Getting Started Guide Qualys PCI provides businesses, merchants and online service providers with the easiest, most cost effective and highly automated way to achieve compliance with the Payment Card Indus

Add to Reading List

Source URL: www.qualys.com

Language: English - Date: 2016-03-18 15:34:30
937Health informatics / Computing / Computer security / XACML / Health information exchange / Security Assertion Markup Language / Electronic health record / Health

IHE Work Item Proposal (Detailed) 1. Proposed Work Item: Patient Privacy Policy Query Proposal Editor: IHE Suisse Tony Schaller (Technical Project Manager)

Add to Reading List

Source URL: www.ihe-suisse.ch

Language: English - Date: 2016-05-17 20:50:28
938Cryptography / Computer access control / Obfuscation / Password / Security / Crypt / Cryptographic software / Password policy / Password strength

Directions To Open Encrypted E-Mails From The State Of Utah When you open an encrypted e-mail from the State of Utah you will see the following message: Depending on which e-mail program you use, you may also see the f

Add to Reading List

Source URL: laborcommission.utah.gov

Language: English - Date: 2015-09-15 11:55:14
939Security / Cyberwarfare / Prevention / Computer network security / Cybercrime / Email / Password / Computer security / Internet privacy / Rootkit / Computer virus / Internet

IT ACCEPTABLE USE STANDARDS PURPOSE A standard includes specific low level mandatory controls that help enforce and support a policy. The purpose of this document is to support and outline in detail

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:51
940Computer security / Security / Computer access control / Open standards / Internet of Things / Ambient intelligence / Authentication / Open Connectivity Foundation / Identity management

Identity and Access Management for Smart Home Devices

Add to Reading List

Source URL: nccoe.nist.gov

Language: English - Date: 2016-06-03 07:49:14
UPDATE